Skip to main content

Showing 1–3 of 3 results for author: De Coninck, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.05031  [pdf, other

    cs.CV

    Mitigating Bias Using Model-Agnostic Data Attribution

    Authors: Sander De Coninck, Wei-Cheng Wang, Sam Leroux, Pieter Simoens

    Abstract: Mitigating bias in machine learning models is a critical endeavor for ensuring fairness and equity. In this paper, we propose a novel approach to address bias by leveraging pixel image attributions to identify and regularize regions of images containing significant information about bias attributes. Our method utilizes a model-agnostic approach to extract pixel attributions by employing a convolut… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: Accepted to the 2024 IEEE CVPR Workshop on Fair, Data-efficient, and Trusted Computer Vision

  2. arXiv:2208.12632  [pdf, other

    cs.CV

    Selective manipulation of disentangled representations for privacy-aware facial image processing

    Authors: Sander De Coninck, Wei-Cheng Wang, Sam Leroux, Pieter Simoens

    Abstract: Camera sensors are increasingly being combined with machine learning to perform various tasks such as intelligent surveillance. Due to its computational complexity, most of these machine learning algorithms are offloaded to the cloud for processing. However, users are increasingly concerned about privacy issues such as function creep and malicious usage by third-party cloud providers. To alleviate… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: Accepted to the MLCS workshop at ECML PKDD 2022

  3. arXiv:2110.15171  [pdf, other

    cs.CV cs.LG

    Privacy Aware Person Detection in Surveillance Data

    Authors: Sander De Coninck, Sam Leroux, Pieter Simoens

    Abstract: Crowd management relies on inspection of surveillance video either by operators or by object detection models. These models are large, making it difficult to deploy them on resource constrained edge hardware. Instead, the computations are often offloaded to a (third party) cloud platform. While crowd management may be a legitimate application, transferring video from the camera to remote infrastru… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.